References

General Guides and Cheat Sheets for Windows Privilege Escalation

Here’s a consolidated list of resources, guides, and cheat sheets to assist security professionals in understanding and exploiting Windows privilege escalation techniques. Each resource provides detailed methodologies and tools for different aspects of privilege escalation.


General Guides

  1. Microsoft Documentation on icacls Learn how to modify and view Access Control Lists (ACLs) on Windows systems. Read morearrow-up-right

  2. Privilege Escalation Windows - Philip Linghammar Comprehensive coverage of Windows privilege escalation techniques. Guide Linkarrow-up-right (Placeholder, ensure you access it from a reputable source)

  3. Windows Elevation of Privileges - Guifre Ruiz Detailed examination of privilege escalation techniques used in Windows environments. Guide Linkarrow-up-right (Placeholder)

  4. The Open Source Windows Privilege Escalation Cheat Sheet by amAK.xyz and @xxByte Community-driven cheat sheet consolidating numerous techniques. Access herearrow-up-right

  5. Windows Privilege Escalation Fundamentals Essential concepts and strategies in Windows privilege escalation. Guide Linkarrow-up-right

  6. TOP 10 Ways to Boost Your Privileges in Windows Systems - Hackmag A concise article outlining effective privilege escalation techniques. Read herearrow-up-right

  7. Windows Privilege Escalation Guide - Absolomb's Security Blog Comprehensive guide covering various privilege escalation scenarios. Blog Linkarrow-up-right


Advanced Techniques and Specific Vulnerabilities

  1. Abusing DiagHub - xct Exploits the Microsoft Diagnostics Hub for privilege escalation. Article Linkarrow-up-right

  2. Weaponizing Privileged File Writes with the USO Service - itm4n Exploits Windows Update Service for file write vulnerabilities. Article Linkarrow-up-right

  3. Abusing SeLoadDriverPrivilege for Privilege Escalation - Oscar Mallo Discusses exploiting driver loading privileges for EoP. Guide Linkarrow-up-right

  4. Abusing Arbitrary File Deletes to Escalate Privilege - Simon Zuckerbraun Explores privilege escalation through file deletion vulnerabilities. Read morearrow-up-right

  5. Giving JuicyPotato a Second Chance: JuicyPotatoNG Updates and new methods for using JuicyPotato for EoP. Guide Linkarrow-up-right

  6. Hacking Trick: Environment Variable $Path Interception Techniques involving environment variable manipulation for EoP. Read morearrow-up-right


Workshop and Presentation Resources

  1. Local Privilege Escalation Workshop - @sagishahar A presentation covering techniques and strategies for local privilege escalation. Slides Linkarrow-up-right (Placeholder)

  2. Windows Exploitation Tricks - James Forshaw, Project Zero Techniques for exploiting file writes and other vulnerabilities. Read morearrow-up-right

  3. Alternative Methods of Becoming SYSTEM - Adam Chester Unconventional techniques for achieving SYSTEM privileges. Article Linkarrow-up-right


Pentestlab.blog Series

A series of detailed posts covering different privilege escalation techniques:

  • WPE-01: Stored Credentials

  • WPE-02: Windows Kernel

  • WPE-03: DLL Injection

  • WPE-04: Weak Service Permissions

  • WPE-05: DLL Hijacking

  • WPE-06: Hot Potato

  • WPE-07: Group Policy Preferences

  • WPE-08: Unquoted Service Path

  • WPE-09: Always Install Elevated

  • WPE-10: Token Manipulation

  • WPE-11: Secondary Logon Handle

  • WPE-12: Insecure Registry Permissions

  • WPE-13: Intel SYSRET

Read the series herearrow-up-right


Living Off The Land Binaries and Scripts (LOLBAS)

LOLBAS Project: Catalogs Microsoft-signed binaries and scripts that can be abused for unintended actions. Learn morearrow-up-right


Conclusion

These resources provide a comprehensive knowledge base for understanding and exploiting privilege escalation in Windows systems. They are invaluable for penetration testers, red teamers, and security professionals aiming to identify and mitigate privilege escalation vulnerabilities.

Last updated